In planning digital defences, the biggest obstacle is human ingenuity

There is a tendency to believe that cyber security is different.

December 07, 2011 12:39 am | Updated December 04, 2021 11:08 pm IST

Security is a curious concept, part perception and part prognostication. Webster's captures both sides of this dichotomy in its definition: “freedom from danger; freedom from fear.”

Fear concerns a perceived threat; danger reflects what actually threatens us. We fear attacks that never come and live blissfully unaware of true dangers around the corner. This uncertainty is only intensified when our security concerns are transformed by changes in technology.

Indeed, technology and its abuse evolve hand in hand. Just as the internal combustion engine begat highway accidents and auto theft, many of the most visible and transformative successes of computing technology — e-mail, databases, e-commerce, the Web and so on — have ushered in whole new classes of abuse.

But the evolution of computer security is not merely some dark mirror, passively reflecting advances in technology. While technology provides new opportunities for threats, these become true dangers only when there is a motivation to exploit them and a means to do so. Anticipating security threats is not merely a matter of reasoning abstractly about how new technology might raise new risks; it requires an understanding of human nature.

Driven by commerce

Today, the evolution of computer abuse — and therefore of computer security — is driven by commerce. Botnets, spam, phishing, banking trojans, identity theft and so on are all commercially motivated enterprises perfected in a constant arms race with a well-financed computer security industry.

As little as a decade ago, this ecosystem did not exist. The computer viruses and worms of the 20th century were joy riders, driven primarily by an ambition for notoriety.

But once it became possible to make money from computer infection, whether through advertising (like spam) or theft (like stealing bank account credentials), this economic engine fed a bloom in online crime that we are still experiencing.

Such economically motivated attacks are unlikely to disappear, and we can expect new threats to directly reflect each new technical innovation in how money is used, moved and stored. Emerging cellphone-based payment systems, automated banking transfers and the increasingly liquid markets for online goods in multiplayer games will all be ripe targets for online crooks.

While criminal profit-seeking is perhaps the largest force transforming the computer security landscape today, it is by no means the only one. Another is the large-scale collection and use of personal data.

As we leave ever more detailed online footprints — via purchasing, browsing and social relationships — a vast “big data” ecosystem has emerged to collect, process and resell this information. Concerns about this issue are typically framed in terms of privacy: How much do I want others to know about me? How might it affect my ability to get health insurance, employment or credit?

While these are important questions, they do not capture the full extent of how this data might be used — not just to extract information about people's desires and social relationships, but to use that understanding to affect their behaviour. Nor would this be limited to the banal goal of getting you to purchase a particular product; it could be used for Internet-scale social monitoring and manipulation.

The ease with which we adopt online personas and relationships has created a collective blind spot that computer technology is well suited to exploit. Advances in natural-language processing and data mining make it entirely feasible to mint millions of “social bots,” each establishing online friendships with their targets like virtual con men, each building trust over time and delivering personalised messages designed to elicit information, sway opinion or call to action.

This idea, which one of my colleagues has called “social architecture,” completely upends traditional computer security concerns: The threat is not of humans controlling or monitoring our computers, but precisely the converse.

As an instrument of war

Finally, there is growing potential for the abuse of computers as an instrument of war. The obvious issues involve espionage and information theft, but the real transformation is much broader.

The Stuxnet worm, designed to sabotage gas centrifuges in Iran, made it clear that computer attacks can have physical, real-world consequences — a particularly troubling precedent because computing capabilities are now embedded in virtually every aspect of our lives. The power we use, the water we drink, the cars, planes and trains we travel in, the elevators and air-conditioning in our buildings, even many of our children's toys — all are controlled by computers.

A parallel trend, fuelled by cheap wireless connectivity, is that these devices are increasingly networked. And while few of these systems have been attacked in anger, it is this very fact that leads most of them to be rife with vulnerabilities — a sheltered ecosystem with no immunity to attacks from an outside invader.

Earlier this year, my colleagues and I demonstrated weaknesses that allowed us to remotely infiltrate, track and control popular automobiles more than 1,000 miles away. Other researchers have demonstrated remote attacks on implantable cardiac defibrillators, smart power meters, utility control networks and so on.

The crucial question is whether these are merely Chicken Little fears or real dangers. And the answer will be a matter not of technology but of politics. Do conflicting powers believe that such attacks will advance their aims better than alternatives, that they are worth the effort to develop, that they are worth the risks of retaliation?

There is a tendency to believe that computer security is different from other security. Maybe because computing is mechanistic and predictable, we like to think that security questions should succumb to some form of deterministic analysis.

But security is at its heart a human issue. It is about conflict, and computers are merely a medium by which conflict can be expressed. The future of computer security, then, is less about the future of technology than it is about the future of human relations. ( Stefan Savage is a professor of computer science and engineering at the University of California, San Diego .) — New York Times News Service

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.